Preferred Language
Articles
/
jcoeduw-26
Identity Crisis in the Novel Cuffs of Papers for Yusef Hadi Mays
...Show More Authors

This research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and  the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of prevention and the presentation of a topic is the talk of the hour as presented the nature of policies based on interests and reconsider the issue of human rights in the light of the changes taking place and rapid developments in the world. The first section deals with the conflict of identities , the second is the struggle of ideologies, then the conclusion and the list of sources.        

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 12 2012
Journal Name
Pramana
Nucleon momentum distributions and elastic electron scattering form factors for some 1p-shell nuclei
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jul 19 2024
Journal Name
An International Journal Of Optimization And Control: Theories & Applications (ijocta)
Design optimal neural network based on new LM training algorithm for solving 3D - PDEs
...Show More Authors

In this article, we design an optimal neural network based on new LM training algorithm. The traditional algorithm of LM required high memory, storage and computational overhead because of it required the updated of Hessian approximations in each iteration. The suggested design implemented to converts the original problem into a minimization problem using feed forward type to solve non-linear 3D - PDEs. Also, optimal design is obtained by computing the parameters of learning with highly precise. Examples are provided to portray the efficiency and applicability of this technique. Comparisons with other designs are also conducted to demonstrate the accuracy of the proposed design.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
High Transaction Rates Performance Evaluation for Secure E-government Based on Private Blockchain Scheme
...Show More Authors

 

The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 26 2024
Journal Name
World Electric Vehicle Journal
Fast Finite-Time Composite Controller for Vehicle Steer-by-Wire Systems with Communication Delays
...Show More Authors

The modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Cooling Load Calculations For Typical Iraqi Roof And Wall Constructions Using Ashrae's RTS Method
...Show More Authors

The present work is an attempt to develop design data for an Iraqi roof and wall constructions using the latest ASHRAE Radiant Time Series (RTS) cooling load calculation method. The work involves calculation of cooling load theoretically by introducing the design data for Iraq, and verifies the results experimentally by field measurements. Technical specifications of Iraqi construction materials are used to derive the conduction time factors that needed in RTS method calculations. Special software published by Oklahoma state university is used to extract the conduction factors according to the technical specifications of Iraqi construction materials.  Good agreement between the average theoretical and measured cooli

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Loading and Activating a Carbon Surface and Applied for Congo Red Adsorption, Kinetic Study
...Show More Authors
Abstract<p>this paper contains preparation of Active carbon surface (AC) from pro so millet grain husks and Loading and activating by Iron oxide and hydrogen peroxide sequentially to obtain surface (ACIPE). The changes of previous processes on Active carbon surface were diagnosed by Fourier transform infrared spectroscopy (FTIR) and Scanning electron microscopy ( SEM ). These surfaces (AC and ACIPE ) were using as adsorbent for removing of congo red dye from aqueous solutions under certain conditions through batch system. More than one kinetic model was applied to congo red dye adsorption process and it was found that the most kinetic model applied to it is a model ( pseudo second order model). </p> ... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 19 2020
Journal Name
Applied Water Science
Spiral path three phase fluidized bed reactor for treating wastewater contaminated with engine oil
...Show More Authors
Abstract<p>In this study, a new type of circulating three-phase fluidized bed reactor was conducted by adding a spiral path and was named as spiral three-phase fluidized bed reactor (TPFB-S) to investigate the possibility for removing engine oil (virgin and waste form) from synthetic wastewater by using Ricinus communis (RC) leaves natural and activated by KOH. The biosorption process was conducted by changing particle diameter in the range 150–300 and 300–600 µm, liquid flow rate in the range 2.5–4.5 L/min and gas flow rate in range of 0–1 L/min, while other parameters initial oil emulsion concentration, pH, adsorbent concentration, agitation speed and contact time were kept constant at 2000 mg/L, 2,</p> ... Show More
View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref